Find network and information security news, reviews and analysis, covering data protection, privacy, endpoint security, and security management.
  • E-ZPass drivers warned about Phishing scam

    Posted July 14, 2014 - 6:10 pm

    E-ZPass Group, a toll collection program consisting of 25 agencies in 15 states, has issued a warning to customers concerning a Phishing scam that is posing as a collection notice.
  • White Paper

    Who's Spying on You?

    Posted July 14, 2014 - 5:00 pm

    You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments
  • White Paper

    The Threat Landscape

    Posted July 14, 2014 - 5:00 pm

    Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?
  • White Paper

    Be the One Who Puts Security on the Agenda eBook

    Posted July 14, 2014 - 3:45 pm

    You want to maximize the potential offered by new technologies and establish an advantage over your competitors. But you know the latest IT developments can also bring new security challenges.
  • White Paper

    Virtualization Best Practices Guide

    Posted July 14, 2014 - 3:45 pm

    Whether you're running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk.
  • White Paper

    IT Security by the Numbers: Calculating the Total Cost of Protection

    Posted July 14, 2014 - 3:45 pm

    Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.
  • Slideshow

    The Black Hat Quiz 2014

    Posted July 14, 2014 - 3:23 pm

    How well do you know the security conference’s revelations about NSA, pwned cars, spying cell phones and more?
  • New banking malware 'Kronos' advertised on underground forums

    Posted July 14, 2014 - 2:33 pm

    A new Trojan program designed to steal log-in credentials and other financial information from online banking websites is being advertised to cybercriminal groups on the underground market.
  • White Paper

    Mapping Organizational Roles & Responsibilities for Social Media Risk

    Posted July 14, 2014 - 2:30 pm

    Social media has introduced a wide array of opportunities for organizations to engage with customers, employees and partners. But with these opportunities come risks.
  • White Paper

    Secure Your Social Organization

    Posted July 14, 2014 - 2:30 pm

    Teams throughout your enterprise are creating new social media accounts and adopting their own platforms to manage them.
  • White Paper

    5 Step Guide to Social Media Security

    Posted July 14, 2014 - 12:00 pm

    As businesses embrace social media, related security breaches are on the rise. Corporate Twitter hackings. Rogue employees on the company Facebook account. Executives sharing confidential info on their personal accounts.
  • White Paper

    The Importance of Reputation

    Posted July 14, 2014 - 11:45 am

    Proactive enterprise security involves turning data into actionable information--that's where reputation comes in.
  • How to sign up for Microsoft's restored security alert email service

    Posted July 14, 2014 - 11:24 am

    Microsoft has restored service to its security advisory mailing list, but it has buried the sign-up form and made it hard to find.
  • Revamping your insider threat program

    Posted July 14, 2014 - 11:01 am

    Companies including MITRE are looking at privileged access and how to better lock it down -- without stopping employees from doing their jobs.
  • White Paper

    Security in the Cloud

    Posted July 14, 2014 - 10:31 am

    The main obstacle to enterprise cloud deployment, according to a new survey of more than 350 IT executives by Unisys and IDG Research, is security. What can enterprise IT professionals do to help make their cloud deployments more secure?
  • White Paper

    A user-centric path to mobile security

    Posted July 14, 2014 - 10:31 am

    Mobile technology has revolutionized the way millions of people do their jobs. Employees now have unprecedented levels of flexibility, including the ability to work anytime from anywhere.
  • The Firewall: Questions abound about its future role in cloud, mobile and SDN environments

    Posted July 14, 2014 - 10:13 am

    It's been 20 years since Check Point Software Technologies shipped its first enterprise network firewall, marking the beginning of a mass market for firewalls that has protected millions of networks across the world.
  • Future Java 7 security patches will work on Windows XP despite end of official support

    Posted July 14, 2014 - 9:09 am

    Oracle has dispelled rumors that the upcoming security update for Java 7 and those it will release in the future might not work on Windows XP.
  • Cybersecurity fears drive SMBs to third-party payment services

    Posted July 14, 2014 - 8:46 am

    Between 2010 and 2013, there was a 25 percent drop in small business processing online orders as traditional credit card merchants. Instead, they turned to third-party payment services, primarily due to concerns over cybersecurity and costs.
  • LastPass discloses now-fixed vulnerabilities ahead of security conference

    Posted July 13, 2014 - 10:34 pm

    Popular password manager LastPass said it fixed two vulnerabilities that were found last year. The disclosure comes just ahead of a security conference where a research paper describing the problems is due to be presented.
  • How to choose passwords to improve your life

    Posted July 12, 2014 - 4:29 pm

    It's no longer just a matter of "Can you remember them?". Your passwords can serve as a form of catharsis or a way to remind yourself of where you want to be in life.
  • White Paper

    SBIC: Transforming Information Security

    Posted July 11, 2014 - 4:15 pm

    This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
  • Question

    How could the iPhone threaten China’s national security?

    Posted July 11, 2014 - 3:07 pm

    China is claiming that the iPhone poses a threat to the country’s national security, and there is talk about banning iPhone sales completely. China is not Apple’s largest market, with sales of about 3 million iPhones per quarter, but that’s still a significant amount of revenue that the company stands to lose.
  • There's still a security disconnect on BYOD

    Posted July 11, 2014 - 3:00 pm

    Corporate employees are taking a surprisingly lax approach towards security issues raised by the business use of personally owned mobile devices.
  • The biggest data breaches of 2014 (so far)

    Posted July 11, 2014 - 1:23 pm

    In the battle to keep your personal information private, it's not just hackers you have to worry about but lax security and stupidity.
Join us:






Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Join today!

See more content
Ask a Question